{"id":"https://openalex.org/W7124144054","doi":"https://doi.org/10.1109/icpads67057.2025.11323064","title":"A Behavioural Fingerprinting-Based Attack Detection Framework for Smart Home Devices","display_name":"A Behavioural Fingerprinting-Based Attack Detection Framework for Smart Home Devices","publication_year":2025,"publication_date":"2025-12-14","ids":{"openalex":"https://openalex.org/W7124144054","doi":"https://doi.org/10.1109/icpads67057.2025.11323064"},"language":null,"primary_location":{"id":"doi:10.1109/icpads67057.2025.11323064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11323064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111287619","display_name":"T.J. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Tianpu Li","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006195175","display_name":"Tomasz Szyd\u0142o","orcid":"https://orcid.org/0000-0003-4101-2115"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tomasz Szydlo","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123043086","display_name":"Rajiv Ranjan","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rajiv Ranjan","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123048341","display_name":"Devki Nandan Jha","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Devki Nandan Jha","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111287619"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.68699674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4223000109195709,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4223000109195709,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.17219999432563782,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.07729999721050262,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.8418999910354614},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7642999887466431},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.6420000195503235},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4740999937057495},{"id":"https://openalex.org/keywords/home-security","display_name":"Home security","score":0.350600004196167},{"id":"https://openalex.org/keywords/low-energy","display_name":"Low energy","score":0.34049999713897705},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.33629998564720154},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.33000001311302185}],"concepts":[{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.8418999910354614},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7642999887466431},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.6420000195503235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.599399983882904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5903000235557556},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4740999937057495},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3765000104904175},{"id":"https://openalex.org/C2779750879","wikidata":"https://www.wikidata.org/wiki/Q22908936","display_name":"Home security","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C2989164559","wikidata":"https://www.wikidata.org/wiki/Q15637420","display_name":"Low energy","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.33629998564720154},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.33000001311302185},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.31130000948905945},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3098999857902527},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2761000096797943},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C163362911","wikidata":"https://www.wikidata.org/wiki/Q17152351","display_name":"Smart system","level":3,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpads67057.2025.11323064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11323064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8808577060699463,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W24265679","https://openalex.org/W2295598076","https://openalex.org/W3003622852","https://openalex.org/W3123941558","https://openalex.org/W3127800809","https://openalex.org/W4207085300","https://openalex.org/W4220733186","https://openalex.org/W4252219488","https://openalex.org/W4295123894","https://openalex.org/W4361264071","https://openalex.org/W4367319881","https://openalex.org/W4381745757","https://openalex.org/W4388763427","https://openalex.org/W4393336635","https://openalex.org/W4400762160","https://openalex.org/W4401578844","https://openalex.org/W4401612363","https://openalex.org/W4402522034","https://openalex.org/W4403600613","https://openalex.org/W4403834481","https://openalex.org/W4404563885","https://openalex.org/W4405361457","https://openalex.org/W4406902302","https://openalex.org/W4407826097","https://openalex.org/W4409225874","https://openalex.org/W4410492291","https://openalex.org/W4413007916"],"related_works":[],"abstract_inverted_index":{"Smart":[0],"home":[1,93,146],"systems,":[2],"which":[3],"integrate":[4],"diverse":[5],"IoT":[6],"devices":[7,43],"for":[8,39,143],"automation":[9],"and":[10,23,36,48,78,102,140],"energy":[11],"efficiency,":[12],"are":[13],"increasingly":[14],"targeted":[15],"by":[16],"cyber":[17],"threats":[18],"such":[19],"as":[20],"Man-in-the-Middle":[21],"(MitM)":[22],"Denial-of-Service":[24],"(DoS)/Distributed":[25],"DoS":[26],"(DDoS)":[27],"attacks.":[28],"Traditional":[29],"security":[30,56],"mechanisms":[31],"often":[32],"lack":[33],"the":[34,121],"adaptability":[35],"responsiveness":[37],"needed":[38],"real-time":[40],"protection,":[41],"leaving":[42],"vulnerable":[44],"to":[45,67],"data":[46],"breaches":[47],"manipulation.":[49],"This":[50],"paper":[51],"proposes":[52],"a":[53,90,109,138],"behavioural":[54],"fingerprinting-based":[55],"framework":[57],"that":[58,120],"combines":[59],"threshold-based":[60],"detection":[61,111],"with":[62,133],"machine":[63],"learning":[64],"(ML)":[65],"classification":[66],"identify":[68],"anomalies":[69],"in":[70,89,127],"device":[71],"activity":[72],"patterns,":[73],"including":[74],"round-trip":[75],"time":[76],"(RTT)":[77],"Address":[79],"Resolution":[80],"Protocol":[81],"(ARP)":[82],"behaviour.":[83],"The":[84,117],"proposed":[85,122],"approach":[86],"is":[87],"evaluated":[88],"real":[91],"smart":[92,145],"testbed":[94],"environment":[95],"using":[96],"an":[97,103],"IP":[98],"camera,":[99],"Raspberry":[100],"Pis,":[101],"ASUS":[104],"router.":[105],"Experimental":[106],"results":[107,118],"demonstrate":[108],"high":[110],"accuracy":[112],"across":[113],"varied":[114],"attack":[115],"scenarios.":[116],"show":[119],"system":[123],"can":[124],"detect":[125],"attacks":[126],"near":[128],"real-time,":[129],"while":[130],"maintaining":[131],"compatibility":[132],"third-party":[134],"applications,":[135],"making":[136],"it":[137],"practical":[139],"effective":[141],"solution":[142],"enhancing":[144],"security.":[147]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-15T00:00:00"}
